CONSTRUCTION METHOD OF INFORMATION SECURITY DETECTION BASED ON CLUSTERING ALGORITHM

被引:0
|
作者
Chen, Shaobo [1 ]
机构
[1] Shaanxi Univ Technol, Sch Math & Comp Sci, Hanzhong 723000, Peoples R China
来源
关键词
Clustering; Information security; Safety evaluation; PSO algorithm; K; -prototypes; NETWORK; TIME;
D O I
10.12694/scpe.v25i6.3247
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A method for K-prototype clustering, which can process mixed data types, is proposed first. An algorithm for information security evaluation of hybrid clusters based on K-prototypes was constructed. This method makes full use of the excellent global optimization performance of PSO and effectively solves the defect that the K-protection function quickly falls into local optimization. Simulation results show that the proposed method can effectively prevent local extreme values and improve overall performance.
引用
收藏
页码:5295 / 5301
页数:7
相关论文
共 50 条
  • [21] A Semantic Knowledge Base Construction Method for Information Security
    Yao, Yuangang
    Ma, Xiaoyu
    Liu, Hui
    Yi, Jin
    Zhao, Xianghui
    Liu, Lin
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 803 - 808
  • [22] Construction of College English Teaching Information Resource Integration Model Based on Fuzzy Clustering Algorithm
    Deng, Hua
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [23] Social media user information security encryption method based on chaotic algorithm
    Yi, Xiao
    International Journal of Web Based Communities, 2024, 20 (1-2) : 128 - 138
  • [24] Smart grid information security evaluation method based on risk weight algorithm
    Li, He
    Zhang, Zhiang
    Sun, Jia
    Qi, Ziyi
    Min, Yue
    Qi, Zhi
    INTERNATIONAL CONFERENCE ON ALGORITHMS, HIGH PERFORMANCE COMPUTING, AND ARTIFICIAL INTELLIGENCE (AHPCAI 2021), 2021, 12156
  • [25] Network Information Security Risk Assessment Method Based on Machine Learning Algorithm
    Jiang, Ruirong
    Wan, Liyong
    ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2022, PT II, 2023, 469 : 403 - 416
  • [26] A construction method of pattern recognition RBF ANNs based on a fuzzy automatic clustering algorithm
    Zhao, TS
    Li, ZZ
    Zhang, ZF
    Proceedings of the 11th Joint International Computer Conference, 2005, : 576 - 579
  • [27] Studies on information clustering algorithm based on MID
    College of Information Science and Engineering, Shandong Agricultural University, Taian 271018, China
    不详
    Chin J Electron, 2006, 4 A (918-920):
  • [28] Ontology based Clustering Algorithm for Information Retrieval
    Ravishankar, Nadana T.
    Shriram, R.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [29] Study on mutual information based clustering algorithm
    Hongfang, Zhou
    Boqin, Feng
    Lintao, Lv
    Hui, Yue
    Information Technology Journal, 2007, 6 (02) : 251 - 254
  • [30] A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET
    Rathish, C. R.
    Karpagavadivu, K.
    Sindhuja, P.
    Kousalya, A.
    INFORMATION TECHNOLOGY AND CONTROL, 2021, 50 (01): : 45 - 54